Professional Documents
Culture Documents
Seminar Report - Odt
Seminar Report - Odt
DIPLOMA IN ENGINEERING
on
ELECTRONICS AND COMMUNICATION
Submitted by
SARATH S
Reg no:17201129
CERTIFICATE
Certified that seminar work entitled “BIOMETRIC ATM SECURITY SYSTEM”is a
bonafide work carried out in the fifth semester by “SARATH S” in partial fulfillment forthe
award of Diploma in Engineering in “ELECTRONICS AND COMMUNICATION” from
university of Kerala during the academic year 2017-2019,who carried out the seminar work
under the guidance and no part of this work has been submitted earlier for the award of any
diploma.
ACKNOWLEDGEMENT
First of all, I am indebted to the GOD ALMIGHTY for giving me an opportunity to excel
in my efforts to complete this seminar on time.
I am extremely grateful to Mr.RAJU,Principal, MGM POLYTECHNIC KILIMANOOR
and Mr.ANEESH A, Head of Department, Department of Electronics And Communication,for
providing all the required resources for the successful completion of my seminar.
My heartfelt gratitude to my seminar guide Mr. MISBAN A S, Lecturer, Electronics and
Communication, for his valuable suggestions and guidance in the preparation of the seminar
report.
I express my thanks to Mr.SREE HARI , Lecturer, and all staff members and friends for all
the help and co-ordination extended in bringing out this seminar successfully in time.
I will be failing in duty if I do not acknowledge with grateful thanks to the authors of the
references and other literatures referred to in this seminar.
Last but not the least; I am very much thankful to my parents who guided me in every step
which I took.
SARATH S
CONTENTS
1 ABSTRACT 01
2 INTRODUCTION 02
3 LITERATURE REVIEW 03
4 WORKING 04
5 APPLICATION 05
6 FUTURE SCOPE 06
7 CONCLUSION 07
8 REFERENCES 08
ABSTRACT
Now a days ATM systems are not secure because, there are some hackers which are capable of
accessing ATM accounts of the people seeking ATM facility. Inorder to put ATM accounts of
people to a more secure side we are introducing our new idea of finger print module to verify the
actual user more precisely.So in this way the hackers will not be able to hack the personal
accounts of different people.In our project we are using a finger print module along with ARM
processor. In which the different finger patterns of different people are coded and stored by
module itself. The codes generated by module will be monitored by processor consisting all the
codes of users in the form of (their name, account number, balance, etc.) data. And whatever the
service needed to the users will beoffered in a very efficient way.
The basic aim of this project is to study the system, which is used for ATM access to cash
withdrawal with more security. In this system, Bankers will collect the customer finger prints and
mobile number while opening the account then only customer can access ATM machine. The
working of system will start when our customer goes at ATM center. First there is switch for
entry. After getting entry customer has to places his finger on the finger print module. Then
system will check for user identity and checks validity of finger.
1
INTRODUCTION
2
LITERATURE REVIEW
Most finger-scan technologies are basedon minutiae. Samir Nanavati[3] states that 80 percent of
finger-scan technologies are based on minutiae matching but that pattern matching is a leading
alternative. This technology bases its feature extraction and template generation on a series of
ridges, as opposed to discrete points.The use of multiple ridges reduces dependence on minutiae
points, which tend to be affected by wear and tear[4].The downside of pattern matchingis thatit is
more sensitive to the placement of the finger during verification and the created template is
several times larger in byte size.Finger-scan technologyis proven and capable of high levels of
accuracy. There is a long history of fingerprint identification, classification and analysis. This
along with the distinctive features of fingerprints has set the finger-scan apart from other
biometric technologies.There are physiological characteristics more distinctive than the
fingerprint (the iris and retina, for example) but automated identification technology capable of
leveraging these characteristics have been developed only over the past few years. The
technology has grown smaller, more capable and with many solutions available. Devices slightly
thicker than a coin and an inch square in size are able to capture and process images.
Additionally, some may see the large number of finger-scan solutions available today as a
disadvantage; many see it as an advantage by ensuring marketplace competition which has
resulted in a number of robust solutions for desktop, laptop, physical access, and point-of-sale
environments.Biometric data are separate and distinct frompersonal information. Biometric
templates cannot be reverse-engineered to recreate personal information and they cannot be
stolen and used to access personal information
3
WORKING
TYPES OF BIOMETRICS
Fingerprints: The patterns of friction ridges and valleys on an individual's fingertips are
unique to that individual. For decades, law enforcement has been classifying and determining
identity by matching key points of ridge endings and bifurcations. Fingerprints are unique for
each finger of a person including identical twins. One of the most commercially available
biometric technologies, fingerprint recognition devices for desktop and laptop access are now
widely available from many different vendors at a low cost. With these devices, users no longer
need to type passwords – instead, only a touch provides instant access.
Face Recognition: The identification of a person by their facial image can be done in a
number of different ways such as by capturing an image of the face in the visible spectrum using
an inexpensive camera or by using the infrared patterns of facial heat emission. Facial
recognition in visible light typically model key features from the central portion of a facial
image. Using a wide assortment of cameras, the visible light systems extract features from the
captured image(s) that do not change over time while avoiding superficial features such as facial
expressions or hair.
Speaker Recognition: Speaker recognition uses the acoustic features of speech that have
been found to differ between individuals. These acoustic patterns reflect both anatomy and
learned behavioral patterns . This incorporation of learned patterns into the voice templates has
4
earned speaker recognition its classification as a "behavioral biometric." Speaker recognition
systems employ three styles of spoken input: text-dependent, text-prompted and text independent.
Most speaker verification applications use text-dependent input, which involves selection and
enrollment of one or more voice passwords. Text-prompted input is used whenever there is
concern of imposters. The various technologies used to process and store voiceprints include
hidden Markov models, pattern matching algorithms, neural networks, matrix representation and
decision trees.
Iris Recognition: This recognition method uses the iris of the eye which is the colored area
that surrounds the pupil. Iris patterns are thought unique. The iris patterns are obtained through a
video-based image acquisition system. Iris scanning devices have been used in personal
authentication applications for several years. Systems based on iris recognition have substantially
decreased in price and this trend is expected to continue. The technology works well in both
verification and identification modes.
Hand and Finger Geometry: To achieve personal authentication, a system may measure
either physical characteristics of the fingers or the hands. These include length, width, thickness
and surface area of the hand. One interesting characteristic is that some systems require a small
biometric sample. It can frequently be found in physical access control in commercial and
residential applications, in time and attendance systems and in general personal authentication
applications.
5
Fingerprint:-
Humans have used fingerprints for personal identification for many centuries and the matching
accuracy using fingerprints has been shown to be very high. Fingerprinting is probably the best-
known biometric- method of identification used for 100 years. There are a few variants of image
capture technology available for such commercially oriented fingerprint sensor, including optical,
silicon, ultrasound, thermal and hybrid. Among all the biometric techniques, fingerprint-based
Identification is the oldest method that has been successfully used in numerous applications.
Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of
ridges and furrows on the surface of the finger as shown in the fig 3.1.1. The uniqueness of a
fingerprint can be determined by the pattern of ridges and furrows as well as minutiae points.
Minutiae points are the local ridge characteristics that occur either at a ridge ending or a ridge
bifurcation. A ridge ending is defined as the point where the ridge ends abruptly and the ridge
bifurcation is the point where the ridge splits into two or more branches. When a user places
their finger on the terminals scanner the image is electronically read, analyzed, and compared
with a previously recorded image of the same finger which has been stored in the database. The
imaging process is based on digital holography, using an electro-optical scanner about the size of
a thumbprint. The scanner reads three-dimensional data from the finger such as skin undulations,
and ridges and valleys, to create a unique pattern that is composed into a template file.
Figure 3: Fingerprint classification of 6 categories (a) arch, (b) tented arch, (c) right loop,
(d) left loop, (e) whorl, and (f) twin loop
An algorithm is developed to classify fingerprints into five classes, namely, whorl, right loop,
arch and tented arch as shown in figure 3. Critical points in a finger print, called core and delta
are marked on one of the fingers as shown in figure 3 (c). The core is the inner point, normally in
the middle of the print, around which swirls, loops, or arches center. It is frequently characterized
by a ridge ending and several acutely curved ridges. Deltas are the points, normally at the lower
left and right hand of the fingerprint around which a triangular series of ridges center. The
algorithm separates the number of ridges present in four directions (o degree, 45 degree, 90
degree and 135 degree) by filtering the central part of a fingerprint with a bank of Gabor filters.
6
This information is quantized to generate a finger code which is used for classification. To avoid
fake-finger attacks, some systems employ so-called liveness detection technology, which takes
advantage of the sweat activity of human bodies. High-magnification lenses and special
illumination technologies capture the finger’s perspiration and pronounce the finger dead or
alive.
Fingerprint Recognition
The main modules of a fingerprint verification system (cf.Fig.4.1) are: a) fingerprint sensing, in
which the fingerprint of an individual is acquired by a fingerprint scanner to produce a raw
digital representation; b) pre processing, in which the input fingerprint is enhanced and adapted
to simplify the task of feature extraction; c) feature extraction, in which the fingerprint is further
processed to generate discriminative properties, also called feature vectors; and d) matching, in
which the feature vector of the input fingerprint is compared against one or more existing
templates. The templates of approved users of the biometric system, also called clients, are
usually stored in a database. Clients can claim an identity and their fingerprints can be checked
against stored fingerprints
Fingerprint Sensing
The acquisition of fingerprint images has been historically carried out by spreading the finger
with ink and pressing it against paper card. The paper card is then scanned, resulting in a digital
representation. This process is known as off-line acquisition and is still used in law enforcement
applications. Currently, it is possible to acquire fingerprint images by pressing the finger against
the flat surface of an electronic fingerprint sensor. This process is known as online acquisition.
7
There are three families of electronic fingerprint sensors based on the sensing technology
• Solid-state or silicon sensors (Fig.4.2): These consist of an array of pixels, each pixel being a
sensor itself. Users place the finger on the surface of the silicon, and four techniques are typically
used to convert the ridge/valley information into an electrical signal: capacitive, thermal, electric
field and piezoelectric. Since solid-state sensors do not use optical components, their size is
considerably smaller and can be easily embedded. On the other hand, silicon sensors are
expensive, so the sensing area of solid-state sensors is typically small.
• Optical (Fig.4.2): The finger touches a glass prism and the prism is illuminated with diffused
light. The light is reflected at the valleys and absorbed at the ridges. The reflected light is focused
onto a CCD or CMOS sensor. Optical fingerprint sensors provide good image quality and large
sensing area but they cannot be miniaturized because as the distance between the prism and the
image sensor is reduced, more optical distortion is introduced in the acquired image.
• Ultrasound: Acoustic signals are sent, capturing the echo signals that are reflected at the
fingerprint surface. Acoustic signals are able to cross dirt and oil that may be present in the
finger, thus giving good quality images. On the other hand, ultrasound scanners are large and
expensive, and take some seconds to acquire an image.
A new generation of touch less live scan devices that generate a 3D representation of
fingerprints is appearing [22]. Several images of the finger are acquired from different views
using a multi camera system, and a contact-free 3D representation of the fingerprint is
constructed. This new sensing technology overcomes some of the problems that intrinsically
appear in contact-based sensors such as improper finger placement, skin deformation, sensor
noise or dirt
8
The gray scale representation of a fingerprint image is known to be unstable for fingerprint
recognition [59]. Although there are fingerprint matching techniques that directly compare gray
images using correlation-based methods, most of the fingerprint matching algorithms use features
which are extracted from the gray scale image. To make this extraction easy and reliable, a set of
pre-processing steps is commonly performed: computation of local ridge frequency and local
ridge orientation, enhancement of the fingerprint image, segmentation of the fingerprint area
from the background, and detection of singularities. The local ridge orientation at a pixel level is
defined as the angle that the fingerprint ridges form with the horizontal axis [59]. Most of the
algorithms do not compute the local ridge orientation at each pixel, but over a square-meshed
grid (Fig.4.5). The simplest approach for local ridge orientation estimation is based on the gray
scale gradient. Since the gradient phase angle denotes the direction of the maximum pixel-
intensity change, the ridge orientation is orthogonal to this phase angle. There are essentially two
orientation estimation techniques: direction tensor sampling and spectral tensor discretization
using Gabor filters. For its computational efficiency the method independently suggested by is
the most commonly used in fingerprint applications because the spectral approach needs more
filtering. We refer to[12] for a detailed treatment of both approaches.
Fig. 4.4 The six major fingerprint classes: (a) arch, (b) tented arch, (c) left loop, (d) right loop, (e)
whorl, and (f) twin-loop
9
Fig. 4.5 Local ridge orientation of a fingerprint image computed over a square-meshed grid: (a)
original image, (b) orientation image, and (c) smoothed orientation image. Each element of (b)
and (c) denotes the local orientation of the ridges
The local ridge frequency at a pixel level is defined as the number of ridges per unit length along
a hypothetical segment centred at this pixel and orthogonal to the local ridge orientation[59]. As
in the case of the local ridge orientation, the local ridge frequency is computed over a square-
meshed grid. Existing methods [39, 56, 52] usually model the ridge-valley structure as a
sinusoidal-shaped wave (Fig.4.6), where the ridge frequencies set as the frequency of this
sinusoid, and the orientation is used to angle the wave.
Ideally, in a fingerprint image, ridges and valleys flow smoothly in a locally constant direction. In
practice, however, there are factors that affect the quality of a fingerprint image (cf.,Fig4.7):
wetness or dryness of the skin, noise of the sensor, temporary or permanent cuts and bruises in
the skin, variability in the pressure against the sensor, etc. Several enhancement algorithms have
been proposed in the literature with the aim of improving the clarity of ridges and valleys. The
most widely used fingerprint enhancement techniques use contextual filters, which mean
changing the filter parameters according to the local characteristics (context) of the image. Filters
are tuned to the local ridge orientation and/or frequency, thus removing the imperfections and
preserving ridges and valleys (cf.Fig.4.8).
10
Fig. 4.7 : Fingerprint images with different quality. From left to right: high, medium and low
quality, respectively
Fingerprint segmentation consists of the separation of the fingerprint area (foreground) from the
background. This is useful to avoid subsequent extraction of fingerprint features in the
background, which is the noisy area. Global and local thersholding segmentation methods are not
very effective and more robust segment
These techniques exploit the existence of an oriented periodical pattern in the foreground and a
no oriented isotropic pattern in the background (Fig.4.9)
Fig. 4.9 : Segmentation of fingerprint images: (left) original image and (right) segmentation mask
HARDWARE DESIGN
To implement the proposed security for ATM terminals with the use of fingerprint recognition,
we use the different hardware and software platforms. Fig 1 shows the major system modules and
their interconnections
12
Fingerprint Module(FIM3030
The important module of the system is fingerprint scanner. We used FIM3030 by NITGEN. It has
ADSP-BF531 as central processing unitwith 8 MBof SDRAM and 1 MB o f flash ROM.It uses
overall supply voltage of 3.3 V. The communication with the fingerprint moduleis made through
RS-232 via UART0 of LPC2148.A fingerprint sensor is an electronic device used to capture a
digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is
digitally processed to create a biometric template (a collection of extracted features) which is
stored and used for matching. FIM3030is an evolutionary standalone fingerprint recognition
module consisted of optic sensor OPP03 and processing board. As CPU and highly upgraded
algorithm are embedded into a module, it provides high recognition ratio even to small size, wet,
dry, calloused fingerprint. High speed 1: N identification and 1: N verification. FIM3030 has
functions of fingerprint enrollment, identification, partial and entire deletion and reset in a single
board, thereby offering convenient development environment. Off-line functionality stores logs
on the equipment memory (up to 100 fingerprints) and it’s identified using search engine from
the internal algorithm. Evolutionary standalone fingerprint recognition module FIM3030is ideal
for on-line applications, because allows ASCII commands to manage the device from the host.
On-line functionality, fingerprints to verify (1:1) or identify (1: N) can be stored on non volatile
memory, or be sent by RS-232 port
GSM Modem
While accessing the system, we don’t replace the password verification. If password is correct,
the system will capture and match fingerprint of the customer.As shown in Fig 4, if fingerprint
does not match with the account registry for three times, buzzer will be made ON and a message
13
will be delivered to customer’s cellphoneand bank authority.Thus, GSM MODEM to
communicate with the mobile phone to which we are going to send the message isalso interfaced
with LPC2148.
User Interface
The user interface makes the communication between user and the system model easier. It
includes a display unit and a function keyboard.For displaying the status of the process running
in system and instructional steps for the user, we interfaced 16 x 2 LCD matrix with LPC2148
through GPIO pins of port 1
Power Supply
This section is meant for supplying power to all the sections mentioned above. It basically is
consisted of a transformer to step down the 230V ac to 18V ac followed by diodes. Thediodes are
used to rectify the ac to dc. After rectificationprocess,the obtained rippled dc is filtered using a
capacitor Filter. A positive voltageof 12V and 5V are made available through LM7812 and
LM7805. Further, LM317 is used to provide variable power e.g. 3.3V to LPC2148
SOFTWARE DESIGN
The embedded platform discussed above is programmed in C languagewith KeilμVision4 to
follow the program logic shown in Fig 4 as follows.
14
ADVANTAGES
• All the bank accounts are managed in a single finger touch thus no need to carry multiple
cards and remember their passwords.
• The problems like fraud, unlawful entry, cards getting stolen forgetting the PINs are
prevented.
• The system is using biometric instead of PIN for validation. Thus the transactions get
more secure.
• It suspends the fraud calls related to the ATM card verification and all
DISADVANTAGES
• Costly
15
APLLICATIONS
Biometric ATM has gained acceptance in a number of different areas. Application of iris
recognition technology can he limited only by imagination. The important applications are those
following:--
• Used in ATM’s for more secure transaction.
• Credit-card authentication
16
FUTURE SCOPE
1. Authentication.
It is reasonable to expect, thatin a relatively short time,all personal documents will contain some
form of biometric data. Moreover, in time, we could expect that all such documents will no
longer be needed, because, in every instance where this type of authentication would be
necessary, biometric readers will be connected to the location via network. This would allow a
comparison with stored data to be used in lieu of documentation.
3. Travel control.
For a variety of reasons, there is an increasing requirement to have people traveling via planes,
ferries, and even trains to be individually registered, with interim checks at multiple locations.
Today these requirements are being driven mostly by security concerns, visa regulations and
other such reasons. And, because the amount of people traveling is already large and predicted to
increase at significant rates, all organizations involved in the management and control of mass
transportation industries are very interested in the rationalization and automation of necessary
procedures. This is especially the case in International Civil Aviation Organization. The pressure
caused by the growing number of passengers is surely one of the largest reasons for the
introduction of biometric passports, visas and other controls/documents. This organization
recommends very clearly, that “ContractingStates should incorporate biometric data in their
machine readable passports, visas and other official travel documents, using one or more optional
data storage technologies to supplement the machine readable zone, as specified in Doc 9303”1,
20
REFERENCES
1. The Biometric Consortium, “Introduction to Biometrics”, (http://www.biometrics.org),
2006.
2. D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, “Handbook of Fingerprint
Recognition”, Springer, London, 2009.
3. Samir Nanavati, Michael Thieme, and Raj Nanavati, “Biometrics: Identity Verification in
a Networked World”, John Wiley & Sons,2002.
4. Julian Ashbourn, “Biometrics: Advanced Identity Verification”, Springer-Verlag, London,
2002.
5. Edmund Spinella, “Biometric Scanning Technologies: Finger, Facial and Retinal
Scanning”, SANS Institute, San Francisco, CA,2003.
6. Peatman, John B., “Design with PIC Microcontrollers”, Pearson Education, India, 1998.
7. Microchip Technology Inc., “PIC16F87XA data sheet, DS39582C, 2013.
8. .www.scribd.com/doc/50033821
21